Solved

How Do You Tell if You're Being Hacked?!

Posted on 2004-09-19
9
2,300 Views
Last Modified: 2009-11-05
What I wants to know is how can you tell if someone has stolen any personal information from your computer, if they managed to get into your computer, or attempt to get into ur computer.  There has to be a way to tell all connections ever made to the computer.

The only way I knows is netstat (-a -b -n -v -etc)  I knows how to use all those commands.

But is there other ways too tell as well.  Cause lately my internet speed was up and down.  Sometimes when I sends a file or surf the web it's really fast then 5 minutes later the internet goes really slow.  I have broadband and sometimes I gets 5 kbps then another while after I gets 100 kbps.  Seems a little suspiscious and I want to take a closer look into the matter.

So if anyone knows of all the ways to tell all of the connections ever made to this computer.  From startup to shutdown, keep a log of all connections?   Any comments?
0
Comment
Question by:Xygus02
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 

Author Comment

by:Xygus02
ID: 12095989
Note:   my svchost.exe  shows up in my netstat, but my firewall blocks all connections made to and from my computer.  Should I be weary of this connection?
0
 
LVL 12

Expert Comment

by:rossfingal
ID: 12096128
Depending on your system -
you'll have multiple copies of svchost.exe running from:
C:\WINDOWS\System32
or -
C:\WINNT\System32
These are legitimate processes.

Cheers!
RF
0
 
LVL 2

Accepted Solution

by:
smconsult earned 245 total points
ID: 12096255
What kind of firewall are you using?

Sean
0
Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

 

Author Comment

by:Xygus02
ID: 12096292
I'm using Norton Personal Firewall 2003
and the firewall Service Pack 2 comes with.
0
 
LVL 2

Expert Comment

by:smconsult
ID: 12096821
I'm not familiar with the logging capabilities of Norton.

If you were using a hardware firewall of some sort, you could use a Syslog program like Kiwi to log all of the incoming and outgoing connections.  For example, I'm using a Linksys BEFSR81 at the house, and an RV082 at work, and both are dumping their logs to Kiwi for forwarding to Dshield.org.

Are you on dial-up, or broadband?  (From the speeds you mentioned in your original question, it sounds like you're on dial-up.)

Sean
0
 
LVL 11

Expert Comment

by:Quetzal
ID: 12097352
Could be a bad network adaptor, wiring inside or outside.  Try opening a cmd window and do a continuous ping (e.g. ping -t google.com) to see if dropped packets or high latency during the slow periods.
0
 

Expert Comment

by:Xygus
ID: 12097681
No more replys to this question plz.  Xygus02 has been suspended cause experts-exchange suspected me of more then one account.  So I need to end this question immediately, thou I don't have the power to accept any of your answers.  But an admin might be able to do it for me.  If I had to choose anyone here to be rewarded, I would choose smconsult cause he told me about Dshield.org which I am going to use once I knows what my SMTP is.

thx
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
firewall log 4 60
ransomware backup 8 136
email accounts cleansing which was acquired over the period- email validation software 2 74
Certificate Questions - Exchange 2016 11 45
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question